[go: up one dir, main page]

Kainda et al., 2010 - Google Patents

Two heads are better than one: security and usability of device associations in group scenarios

Kainda et al., 2010

View PDF
Document ID
12154886725496645084
Author
Kainda R
Flechais I
Roscoe A
Publication year
Publication venue
Proceedings of the Sixth Symposium on Usable Privacy and Security

External Links

Snippet

We analyse and evaluate the usability and security of the process of bootstrapping security among devices in group scenarios. While a lot of work has been done in single user scenarios, we are not aware of any that focusses on group situations. Unlike in single user …
Continue reading at www.academia.edu (PDF) (other versions)

Similar Documents

Publication Publication Date Title
US9660995B2 (en) Methods, systems, and computer readable media for combating device theft with user notarization
Uzun et al. Usability analysis of secure pairing methods
US9094388B2 (en) Methods and systems for identifying, verifying, and authenticating an identity
Vaziripour et al. Is that you, Alice? A usability study of the authentication ceremony of secure messaging applications
Das et al. A qualitative study on usability and acceptability of Yubico security key
US8807426B1 (en) Mobile computing device authentication using scannable images
US11005661B1 (en) Methods and systems for cryptographically secured outputs from telemedicine sessions
US11580559B2 (en) Official vetting using composite trust value of multiple confidence levels based on linked mobile identification credentials
Kainda et al. Two heads are better than one: security and usability of device associations in group scenarios
Ion et al. Influence of user perception, security needs, and social factors on device pairing method choices
Halunen et al. Review of the use of human senses and capabilities in cryptography
Vaziripour et al. I Don't Even Have to Bother Them! Using Social Media to Automate the Authentication Ceremony in Secure Messaging
US20240005414A1 (en) Systems and methods for self and social discovery
Nithyanand et al. Groupthink: Usability of secure group association for wireless devices
Uzun et al. Pairing devices for social interactions: a comparative usability evaluation
CN102594820A (en) Secure multi-party computation privacy-protecting evaluation method based on scenes of internet of things
WO2022095694A1 (en) Blockchain node sharing method based on digital certificate, and product related thereto
US11968189B2 (en) Methods and systems for generating a secure communication channel interface for video streaming of sensitive content
Jain et al. New directions in social authentication
Mujeye A survey on multi-factor authentication methods for mobile devices
Bonde A Generative Artificial Intelligence Based Tutor for Personalized Learning
Rajendran et al. Deniable Encrypted Messaging: User Understanding after Hands-on Social Experience
Bicakci et al. How safe is safety number? A user study on SIGNAL’s fingerprint and safety number methods for public key verification
Kainda et al. Secure mobile ad-hoc interactions: reasoning about out-of-band (oob) channels
Fassl Usable authentication ceremonies in secure instant messaging